Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

This reuirement from customer we want to schedule the backup of Message Audit Logs from SMG to diffrent Location such FTP, HTTP or UNC. Schedule should be daily,weekly and monthly basis. Agreed. At least put an Agreed. At least put an ...
Idea by prime007 | 12 Nov 2014 | 1 comment
Following Security Bulletins have been released in July 2014: Microsoft Microsoft Security Bulletin Summary for July 2014 https://technet.microsoft.com/library/security/ms14-jul Symantec product detections for Microsoft ...
Blog Entry by SebastianZ | 17 Jul 2014 | 0 comments
Targeted attacks are some of the most troubling and difficult threats facing modern security infrastructure. Symantec found that the number of targeted campaigns jumped to 91% in 2013. Discover more about these ...
Blog Entry by Solange Deschatres | 15 Apr 2014 | 0 comments
Recommendation for upgrade to LUA 2.3.2.110 Symantec Product Security has posted SYM14-005 Symantec LiveUpdate Administrator Unauthenticated/Unauthorized Account Access ...
Blog Entry by SebastianZ | 14 Apr 2014 | 0 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
Welcome to the Part 3 out of 3 discussing the terms, technologies and concepts related to Symantec Endpoint Protection and Symantec Security Software. In the series you will find description and explanation of several SEP related technologies, tools and ...
Article by SebastianZ | 04 Sep 2013 | 8 comments
Welcome to the Part 2 out of 3 discussing the terms, technologies and concepts related to Symantec Endpoint Protection and Symantec Security Software. In the series you will find description and explanation of several SEP related technologies, tools and ...
Article by SebastianZ | 01 Sep 2013 | 10 comments
Welcome to the Part 1 out of 3 discussing the terms, technologies and concepts related to Symantec Endpoint Protection and Symantec Security Software. In the series you will find description and explanation of several SEP related technologies, tools and ...
Article by SebastianZ | 27 Aug 2013 | 12 comments
Axciom Corporation Wed, 19 June, 2013 - 12:00 - 15:00 CDT Agenda: Lunch & Networking ...
Event by Mark Maynard | 16 May 2013 | 1 comment